/home/pineapplelover
link
fedilink
English
13
edit-2
1Y

Isn’t tor like compromised?

Most people who got caught on Tor were caught by undercover operatives or one of their friends on there got busted. Just general recklessness on there. I have heard that CIA tries to run a bunch of tor nodes to deanonymize tor but I’ve also heard that tor checks if those nodes are legit before allowing them on. I don’t see strong evidence for tor being compromised.

And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

Privacy based solutions is kind of vague, the main privacy and security services I use are Signal, Protonmail, Protonvpn, and Bitwarden. All of these are open source, you can view the source code yourself and see if there’s spyware, strangers look at the code all the time so online strangers can see if there’s spyware in there, they also are all checked and audited by third parties. So the code you see is what you get and there are no backdoors or spyware running in there. You can build it all from source if you’re extra cautious but it’s probably done right.

So I have no idea what this guy is saying but it is not true at all.

@wtry@lemm.ee
link
fedilink
English
11Y

Thanks!

Create a post

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.
  • 1 user online
  • 61 users / day
  • 247 users / week
  • 417 users / month
  • 2.88K users / 6 months
  • 1 subscriber
  • 1.53K Posts
  • 33.9K Comments
  • Modlog